×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents of danielbilar
Helbing nature-2013
567 views
Havoc
616 views
2012 flash aslr bypass
836 views
Win8 (2013) reversing windows8 interesting features of kernel security
823 views
Gross o. carl schmitt's theory of emergency powers
863 views
Joac jan 2012 signed
1.793 views
Shao (2012] [num, optimization] reverse engineering bit torrent- a markov approximation perspective
821 views
Forrester tlp the value of corporate secrets
553 views
Nerc (2010) high impicat low probability events us power grid
793 views
Nerc (2010) high impact low probability events us power grid
1.426 views
Jester dynamic-lesson-asymmetric-unmanaged-cyber-warfare 33889
1.957 views
Kan (2008) drug intoxicated irregular fighters complications, dangers, and responses
761 views
RAID 2012 Memory errors past present future
799 views
Group ib (2012) russian market group-ib report-2011_eng
1.061 views
3755.microsoft study into b70
757 views
Morgenstern (2010) turing machines with two letters and two states
495 views
Inform ation security oversight office 2011costs
319 views
Dainotti (2012) internet background radiation (ibr)
502 views
(2012) understanding integer overflow in c:c++
3.173 views
Ussocom fy 2013_budget_highlights
860 views
Next >